Optimal Sequences, Power Control and User Capacity of Synchronous CDMA Systems with Linear MMSE Multiuser Receivers

Size: px
Start display at page:

Download "Optimal Sequences, Power Control and User Capacity of Synchronous CDMA Systems with Linear MMSE Multiuser Receivers"

Transcription

1 Optimal Sequences, Power Control and User Capacity of Synchronous CDMA Systems with Linear MMSE Multiuser Receivers Pramod Viswanath, Venkat Anantharam and David.C. Tse {pvi, ananth, EECS Department, U C Berkeley CA September 18, 2001 Abstract There has been intense effort in the past decade on developing multiuser receiver structures which mitigate interference between users in spread-spectrum systems. While much of this research is performed at the physical layer, the appropriate power control and choice of signature sequences in conjunction with multiuser receivers and the resulting network user capacity is not well understood. In this paper we will focus on a single cell and consider both the uplink and downlink scenarios and assume a synchronous CDMA (S-CDMA) system. We characterize the user capacity of a single cell with the optimal linear receiver (MMSE receiver). The user capacity of the system is the maximum number of users per unit processing gain admissible in the system such that each user has its quality-of-service (QoS) requirement (expressed in terms of its desired signal-to-interference ratio) met. Our characterization allows us to describe the user capacity through a simple effective bandwidth characterization: Users are allowed in the system if and only if the sum of their effective bandwidths is less than the processing gain of the system. The effective bandwidth of each user is a simple monotonic function of its QoS requirement. We identify the optimal signature sequences and power control strategies so that the users meet their QoS requirement. The optimality is in the sense of minimizing the sum of allocated powers. It turns out that with this optimal allocation of signature sequences and powers, the linear MMSE receiver is just the corresponding matched filter for each user. We also characterize the effect of transmit power constraints on the user capacity. Index Terms: CDMA, Linear MMSE Receivers, Power Control, WBE sequences, User Capacity. Research of the first and second author is supported by the ational Science Foundation under grants CR and IRI Research of this author is supported by the Air Force Office of Scientific Research under grant F , and by an SF CAREER Award under grant CR

2 1 Introduction A central problem in the design of wireless networks is how to use the limited resources such as bandwidth and power most efficiently in order to meet the quality-of-service requirements of applications in terms of bitrate and loss. To meet these challenges, there have been intense efforts in developing more sophisticated physical layer communication techniques. A significant thrust of work has been on developing multiuser receiver structures which mitigate the interference between users in spread spectrum systems. (See for example [21, 8, 9, 26, 10, 14, 15].) In this paper, we focus on a synchronous power-controlled CDMA system with multiuser receivers. The processing gain represents the degrees of freedom in the system. We assume that at the receiver, each user is demodulated using a linear receiver structure; in particular, we focus on the linear MMSE receiver (formally defined in Section 2; also see [10]). We are interested in the user capacity of both the uplink (mobiles to base station) and the downlink (base station to mobiles) of this system equipped with linear MMSE multiuser receiver. We say that a set of users is admissible in the uplink system with processing gain if one can allot signature sequences to the users and control their received power such that the achieved signal-to-interference (SIR) of each user is greater than its SIR requirement. We are interested in the problem of characterizing the maximum number of users per degree of freedom, called the user capacity of the uplink system. Analogous definitions of admissibility and user capacity can be made for the downlink. For the most part in this paper we focus on the uplink (the downlink scenario turns out to be very similar and we briefly summarize the results) and our main results are as follows: 1. K users with SIR requirements 1,..., K are admissible in the system with processing gain if and only if K i < 1 + i This allows us to characterize the admissibility of users via a notion of effective bandwidth. If we consider as the effective bandwidth of a user with SIR requirement 1+, then users are admissible if and only if the sum of their effective bandwidths is less than the processing gain of the system. 2. Our proof of the admissibility of users with SIR requirements 1,..., K is constructive in nature, i.e., we explicitly allocate powers and signature sequences so that users SIR requirements are met (such allocations are called valid). Among the class of valid allocations, we identify the optimal allocation, optimal in the sense of minimizing the sum of allocated powers. The optimal allocation has the following structure: (a) A user is said to be oversized if its effective bandwidth is large relative to the effective bandwidths of the other users. Oversized users are allocated orthogonal signature sequences (hence independent channels) and powers proportional to their SIR requirements. (b) on-oversized users are allocated sequences that we denote generalized Welch- Bound-Equality (WBE) sequences. These users are allocated powers proportional to their effective bandwidth. 2

3 3. With this allocation of signature sequences and powers, the MMSE linear receiver simplifies (somewhat unexpectedly) to the matched filter for each user. Thus the user capacity of a system using the a priori inferior matched filter receiver is the same as that of the system using MMSE linear receiver. 4. In the special case when the SIR requirements of all the users are equal (to say ), our main result simplifies to the following: K users are admissible in the system with processing gain if and only if K < Using the optimality (in the sense of minimizing sum of allocated powers) of the allocation scheme, we identify the precise loss in the admissibility of number of users as a function of the background noise power and the average received power constraint. In [17], the authors consider the scenario when the signature sequences of the users are independent and randomly chosen. They show that the SIR of the users of a large system (with large number of users and large processing gain) converges (in probability) and analyze the user capacity of the system based on the value to which the SIR converges. It is interesting to compare the performance of that system with the one considered here when the sequences are optimally chosen: 1. Under the MMSE receiver, the user capacity of a system using random sequences is asymptotically identical to that of a system with optimally chosen sequences. This holds when there are no transmit power constraints, or equivalently, when the background noise power is low. We will provide an explanation for this phenomenon. 2. Under the conventional matched-filter receiver, a system using random sequences admits 1 user per degree of freedom less than when the sequences are optimally chosen. This shows that while the MMSE and the matched-filter receivers have the same performance when the sequences are optimally chosen, the MMSE receiver is much more robust to the choice of spreading sequences. 3. Under transmit power constraints, systems employing random sequences admit strictly less users than the corresponding systems with optimal sequences. We quantify precisely the gap in performance. In related work, there has been a great deal of research studying the problem of power control of the users for conventional CDMA systems. Distributed iterative algorithms that achieve power control of the users is discussed in for example [4] and [6]. These ideas were extended subsequently to systems with MMSE receivers [18], [7], but they focused on deriving convergent power control algorithms rather than analyzing the achievable user capacity. The problem of identifying good signature sequences has been studied in [12] in the context of a spread-spectrum system with conventional matched filter receiver and equal received power for all users. In [13], for equal received powers, the problem addressed in an information theoretic setting is to identify signature sequences for which the sum capacity, the sum of rates of all the users at which reliable communication can take place, is maximized. To achieve sum capacity joint processing of the users is required (for example, MMSE receivers 3

4 with successive cancellation; see [20]) while in this paper we restrict ourselves to single user demodulators. Though the problem addressed in [13] is thus different from the problem addressed in this paper, the optimal sequences turn out to be identical. This statement is true even for the situation of unequal received powers, as shown by the recent work [23]. An important special case subsumed by our framework is when the signature sequences are constrained to be chosen from an orthogonal sequence set. This corresponds to dividing the entire bandwidth into frequency slots (or channels), i.e., a joint FDMA/CDMA system. In this case the receiver is trivial and both MMSE and matched filter receiver structures coincide. Our main result in this framework is as follows: K users each with SIR requirement are admissible in the system with processing gain if and only if K < We observe that the maximum number of users admissible per unit processing gain differs from the earlier results by an integer part. Thus, we identify the gain by using non-orthogonal codes and multiuser linear receivers; the difference depends on the factor 1 and the processing gain. In the scenario when users are differentiated by their SIR requirement, we identify the user capacity of the system. This paper is organized as follows: In Section 2, we give a precise definition of the uplink model and of the admissibility of the users. User capacity of the uplink system with linear MMSE receivers for the situation of equal SIR requirements of the users is identified in Section 3. In a physical system, the power transmitted by a user is constrained naturally. In Section 4, we demonstrate the optimality of a particular allocation scheme (developed in Section 3) in the sense of minimizing sum of allocated powers. This allows us to precisely quantify the loss in user capacity of the system with a received power constraint. Section 5 completely generalizes the results of Sections 3 and 4 to the situation when users have different SIR requirements. In Section 6, we will focus on the downlink. We can ask our admissibility and user capacity region questions in this setup too. As can be expected, there is a lot of connection between the downlink and uplink scenarios and we summarize the results. Section 7 focuses on the joint FDMA/CDMA setup that corresponds to the restriction of signature sequences to be chosen from an orthogonal sequence set and identifies the user capacity of the system under various settings. Section 8 contains our conclusions and discusses directions towards future work. 2 Model and Definitions 2.1 Standard Synchronous CDMA Model We consider a symbol-synchronous CDMA system and focus on the uplink. Following the standard notation (see Section 2.1 in [22]), the received signal in one symbol interval (of T time units) can be expressed as: K y (t) = X i s i (t) + n (t) t [0, T ] Here T is the inverse of the data rate, K is the number of users and (s i (t), t [0, T ]) is the signature waveform of user i, and is thought of as an element of L 2 [0, T ], the Hilbert space of square integrable functions on [0, T ]. The waveform (s i (t), t [0, T ]) is assumed to have unit norm. The information transmitted by each user is modeled as zero mean, 4

5 independent random variables X 1, X 2,..., X K. The variance E [X 2 i ] is the power at which user i is received. We denote the received power of user i as p i, the product of the transmit power of user i and the path gain from user i to the receiver (base station). By the assumption of perfect power control or equivalently perfect channel estimation, we assume that we can allocate received powers for the users. The process n (t) is additive white Gaussian noise independent of the user symbols X 1,..., X K. Let the processing gain of the system be. Following the usual notation (as in Section of [22]), the signature waveforms can then be written as s i (t) = s i (j) ψ j (t) t [0, T ] (1) j=1 where {(ψ j (t), t [0, T ])} j=1... is an orthonormal set in L 2 [0, T ] and s i (j) is the inner product between the waveform of user i, namely (s i (t), t [0.T ]) and (ψ j (t), t [0, T ]). With some abuse of notation, let us represent the vector of inner products (s i (1),..., s i ()) as s i the signature sequence of user i (s i is a vector in S 1 1, the unit sphere in R ). It is well known that the projections {y j } j=1... of (y (t), t [0, T ]) on {(ψ j (t), t [0, T ])} j=1... are sufficient statistics (see Section and Chapter 3 of [22]) for the problem of demodulating the user symbols. Writing Y = (y 1,..., y ) as a vector in R, the received signal can be written as: K Y = s i X i + W where W is an i.i.d. Gaussian vector with covariance σ 2 I, independent of the transmitted symbols. Henceforth we consider the allocation of signature sequences for the users. By a suitable choice of the orthonormal waveform set {(ψ j (t), t [0, T ])} j=1..., the signature waveforms for the users can be constructed (following (1)). Suppose the symbol of user i is decoded using a linear receiver, denoted by c i (a vector in R ), then the signal to interference ratio of user i (SIR i ) is SIR i = (c i, s i ) 2 p i σ 2 (c i, c i ) + j i (c i, s j ) 2 p j (2) We say that K users are admissible in the system if there is an allocation of positive powers p 1,..., p K, signature sequences s 1,..., s K S 1 1 and linear receiver structures c 1,..., c K such that SIR i i = 1... K Here > 0 is some fixed SIR requirement of each user that has to be met for satisfactory performance. Such a choice of powers and signature sequences is called a valid allocation. 2.2 Structure of Optimum linear receiver It is well known that the MMSE receiver is the optimum linear receiver, optimum in the sense of maximizing the SIR of each user. While there are many derivations of the structure of the MMSE receiver (see [10, 17, 18] for example and Section 6.2 of [22]) c 1,..., c K, we give an elementary derivation of the same as the argument of a problem of minimizing a convex 5

6 function over a convex set below (this will also aid us in developing notation to be used in the characterization of the user capacity regions): Fix the user powers p 1,..., p K, and the signature sequences s 1,..., s K. The optimum receiver c i is one that maximizes SIR i. ow, let S = [s 1, s 2,..., s K ] and D = diag (p 1,..., p K ) and S i = [s 1..., s i 1, s i+1..., s K ] and D i = diag (p 1,..., p i 1, p i+1..., p K ). Let Z i = S i D i Si t + σ 2 I and Z = SDS t + σ 2 I and we note that they are positive definite. Let Z i = U i Λ i Ui t for a positive diagonal matrix Λ i and unitary U i. Also, let SDS t = UΛU t. Then, max SIR (c i, s i ) 2 p i i = max c i 0 c i 0 c t iz i c i = p i max x i 0 x t i Λ 1 2 x i i Ui ts is t i U iλ 1 2 i where x x t i = Λ 1 2 i Ui t c i ix i Thus the argmax is given by x i = Λ 1 2 i Ui ts i and the optimal receiver structure is Hence, under the MMSE receiver, c i = Z 1 i s i (3) SIR i = s t i Z 1 i s i p i (4) where we used the following formula in the second step: ( = s t i Z pi s i si) t 1 si p i ( = s t i Z 1 + Z 1 s i s t iz 1 ) p i s 1 s t iz 1 i p i s i p i s t i = Z 1 s i p i (5) 1 s t iz 1 s i p i ( A xy t ) 1 = A 1 + A 1 xy t A 1 1 y t A 1 x whenever the terms exist. Here s t iz 1 s i p i is strictly less than 1 and thus all the terms are well defined. 3 Characterization of User Capacity We begin with an elementary calculation of the error of estimation using the MMSE linear receiver in terms of the signature sequences and powers of the users and derive a conservation law for the estimation errors. 3.1 Conservation law for the MMSE receiver Recall the channel model in matrix form: Y = SX + W 6

7 where S is the matrix the columns of which are the signature sequences of the users and X is the vector of transmitted symbols from the users. If ˆX is the vector MMSE estimate of X, a direct application of the orthogonality principle yields ˆX = DS t [ SDS t + σ 2 I ] 1 Y and the covariance matrix of the error ɛ ˆX X is given by K ɛ = D DS t [ SDS t + σ 2 I ] 1 SD (6) where D diag(p 1,..., p K ) is the covariance matrix of X. It follows that trace ( ) D 1 2 Kɛ D 1 2 = K trace (D [ 1 2 S t SDS t + σ 2 I ] ) 1 1 SD 2 = K trace (SDS [ t SDS t + σ 2 I ] 1 ) = K where λ i s are the eigenvalues of the matrix SDS t. If we let MMSE i E[( ˆX i X i ) 2 ] p i λ i λ i + σ 2 (7) be the (normalized) minimum mean-square error for user i, then (7) becomes K λ i MMSE i = K (8) λ i + σ 2 > K rank (S) (9) There is a simple one-one relationship between the normalized minimum mean square error MMSE i of user i and the SIR achieved by that user, namely SIR i (see (2)). Let ˆX i be the linear estimate of X i from Y using the linear receiver c i, i.e., ˆXi = c t i Y. We assume [ that c i is (α ) ] 2 appropriately normalized so that the error in the estimate MMSE i (α) = E ˆXi X i is minimized at α = 1 (the corresponding (minimum) error in the estimate denoted by MMSE i ). Then, it can be verified that MMSE i = SIR i (10) In particular, this relation holds when the receiver is the linear MMSE one, that is, c i is chosen according to (3). Using (8) and (10), we have K SIR i 1 + SIR i = K = K MMSE i λ i λ i + σ 2 (11) < (12) 7

8 The upper bound in (12) provides an upper bound to the performance of the users regardless of the signature sequences used and powers allocated - we view this as a conservation law. We can now derive the first main result of this paper: the identification of the user capacity of a single cell S-CDMA system equipped with linear MMSE receiver. We assume that each user has the same SIR requirement. Observe that if the number of users is less than or equal to the processing gain, the trivial choice of orthogonal signature sequences for the users ensures arbitrary SIR requirements to be met if we can scale up the power of the users. Hence, without of loss of generality we henceforth assume that the number of users is greater than the processing gain. 3.2 User Capacity Characterization The following is a complete characterization of the admissibility of the users with equal SIR requirements and equipped with MMSE receivers: Theorem 3.1 K users are admissible in the system with processing gain if and only if ( ) K < Proof Suppose K users are admissible in the system with processing gain. Then, by definition, there exist sequences s 1,..., s K S 1, positive powers p 1,..., p K such that for every user i, we have SIR i, where the receiver structure is as in (3). Appealing now to (12), we have the upper bound ( ) K < To see that this sufficient also, we provide an explicit valid allocation scheme: Suppose K < ( ). Choose the powers to be p i = p = σ K i = 1... K (13) and sequences such that SS t = K I. Then, using (5), i = 1... K, SIR ( i = s t i pss t + σ 2 I ) 1 si p 1 + SIR i = s t i ( K pi + σ2 I) 1 s i p = = p Kp + σ Hence for each user i, we have SIR i = and the K users are admissible in the system with processing gain. We need to show the existence of sequences such that SS t = K I. We begin with some definitions: 8

9 Definition 3.1 For any x = (x 1,..., x n ) R n, let x [1] x [n] denote the components of x in decreasing order, called the order statistics of x. Majorization makes precise the vague notion that the components of a vector x are less spread out or more nearly equal than are the components of a vector y by the statement x is majorized by y. Definition 3.2 For x, y R n, say that x is majorized by y (or y majorizes x) if k x [i] k y [i], k = 1... n 1 n x [i] = n y [i] A comprehensive reference on majorization and its applications is [11]. A simple (trivial, but important) example of majorization between two vectors is the following: Example 3.1 For every a R n such that n a i = 1, ( 1 (a 1,..., a n ) majorizes n, 1 n n),..., 1 It is well known that the sum of diagonal elements of a matrix is equal to the sum of its eigenvalues. When the matrix is symmetric the precise relationship between the diagonal elements and the eigenvalues is that of majorization: Lemma 3.1 (Theorem 9.B.1 and 9.B.2 in [11]) Let H be a symmetric matrix with diagonal elements h 1,..., h n and eigenvalues λ 1,..., λ n we have (λ 1,..., λ n ) majorizes (h 1,..., h n ) That h = (h 1,..., h n ) and λ = (λ 1,..., λ n ) cannot be compared by an ordering stronger than majorization is the consequence of the following converse: If h 1 h n and λ 1 λ n are 2n numbers such that λ majorizes h, then there exists a real symmetric matrix H with diagonal elements h 1,..., h n and eigenvalues λ 1,..., λ n. We use these notions and results to construct sequences such that SS t = K I. The vector (1,..., 1) in R K is majorized by the vector with entries equal to K and the remaining K entries equal to 0 (this is a simple application of Example 3.1). ow, appealing to Lemma 3.1, there exists a symmetric matrix, say P, with unit diagonal entries and eigenvalues K and 0 with multiplicities (both algebraic and geometric) equal to and K respectively. Let v 1,..., v R 1 K be orthonormal eigenvectors of P corresponding to the eigenvalue K. Denoting the matrix S = [s 1,..., s K ], we allocate sequences for the users as below: v 1 K v 2 S =. v Then, note that SS t = K I. These sequences were first identified in [12] (but in their context the sequences were in {1, 1} ) and the authors referred to such s 1,..., s K as WBE sequences, sequences that meet the so-called Welch Bound Equality (see [25]). We henceforth assume that the WBE sequences are in S

10 3.3 Observations on valid allocations Below, we observe some properties of valid allocations in general and in particular the specific valid allocation we demonstrated in the proof of Theorem Suppose K users are admissible in the system with processing gain. Let s 1,..., s K be a valid allocation of sequences. Then, with these sequences fixed, among all valid allocations of powers (i.e., with this power allocation SIR i i ) there exists a componentwise minimal power allocation (see [18]) and with this power allocation, SIR i = i. Hence, when the sequences are WBE sequences, it follows that the power allocation p i = p = σ2 is the component-wise minimal power solution K 2. We now focus on this specific allocation scheme of WBE sequences and corresponding component-wise minimal powers. This schemes allocates the smallest sum of powers among all valid allocations. We show this property in Section 4 when we revisit user capacity with power constraints. 3. With this allocation, the MMSE receiver for user i is given by, following (3), c i = Zi 1 = s i 1 σ 2 I + p j s j s t j j i s i = ( σ 2 I ps i s t i + psst) 1 si ( = σ 2 I ps i s t i + pk ) 1 I s i = as i (14) where a is a constant (which can be shown to be equal to ). Thus the optimal linear p filter in this situation is just a scaled version of the matched filter. This observation allows us to conclude that the user capacity of a system equipped with the a priori inferior matched filter receiver is the same as that of the linear MMSE receiver: Corollary 3.2 K users are admissible in the system with processing gain and equipped with matched filter receivers if and only if ( ) K < Comparison with random sequences It is interesting to compare this result with the corresponding characterization of user capacity of a system with random signature sequences carried out in [17]. The results in [17] are asymptotic and are valid for a large system (i.e., a system with a large processing gain and large number of users). We focus on the system where each user has SIR requirement, the number of users is K and the processing gain is and consider the regime K and and K α. Appealing to the results in [17] we conclude: 10

11 1. Suppose MMSE linear receivers are used. Then, (Section 5 of [17]) the SIR of each user converges (in probability) to a constant and (with appropriate power control) this constant is at least the target requirement if and only if α < Thus, for a large system, this suggests that using random sequences is as good as using the optimal WBE sequences (in the context of user capacity) for the signature sequences of the users. From (9), note that the total normalized MMSE errors of the users is a constant, independent of the relative powers of the users and depends very weakly on the signature sequences. To minimize the maximum MMSE among all users (or equivalently, to maximize the minimum SIRs), it is therefore optimal to have symmetry among the users such that they have the same MMSE. This was achieved using equal received power and the WBE sequences described earlier. However, this symmetrization can also be achieved asymptotically when random sequences are used, since it is shown in [17] that (with appropriate power control) the SIR s of all users will converge to the same number. But maximizing the minimum SIR s is equivalent to maximizing the number of users in a system with given equal SIR requirements. Hence, random sequences and the WBE sequences yield the same user capacity asymptotically. 2. For the scenario of matched filters, following (Section 5 in [17]), the SIR of each user converges (in probability) to a constant and this constant is at least the requirement if and only if α < 1. Thus 1 user per degree of freedom is lost asymptotically when random sequences are used. A conservation law similar to the one for MMSE receivers (as in (12)) is lacking for the matched filter receivers. 4 Power Constraint and User Capacity Our model has not included any constraints on the allocated received power of the users; we now include a received power constraint in our model. In this section we precisely quantify the loss in the user capacity due to the received power constraint; this loss will be a function of both the constraint and the power of the background Gaussian noise. One way to justify the constraint on the received power of the users is by considering average transmit power constraint of the users. If one is able to adopt a model of fading for the users that is ergodic (with the same mean fading) and independent, an average transmit power constraint on the users translates into a received power constraint. 4.1 User capacity with power constraints We define admissibility of K users (each having SIR requirement ) in the system with processing gain and power constraint P as being able to allot i signature sequence s i and power p i P for every user such that the achieved SIR i (given in (4) is at least the target value. If the system has just one user, then, the minimum power required by that single user to meet its SIR requirement is σ 2. To prevent a degenerate situation, we assume that P σ 2. As before, we assume that the number of users is greater than the processing gain. Our main result in this section is to precisely identify the loss in user capacity by including such a power constraint: 11

12 Theorem 4.1 K users (each having SIR requirement ) are admissible in the system with processing gain and average received power constraint P if and only if K < ( σ2 P Proof We first show the necessity: Suppose K users are admissible. Then, there exist signature sequences s 1,..., s K S 1, positive powers p 1,..., p K P such that for every user i, we have SIR i. From (11), we have the conservation law K SIR i 1 + SIR i = ) λ i λ i + σ 2 (15) where λ 1,..., λ are the eigenvalues of the matrix SDS t. We note that tr (Λ) = tr ( SDS t) = tr (D) (16) where the second equality follows by some algebra and noting that the columns of S have unit l 2 norm. ow, if we let p = 1 K p i, then the vector (p, p,..., p ) is majorized by the vector (λ 1,..., λ ) (see Example 3.1). We need the following definition: Definition 4.1 A real valued function φ : R n R is said to be Schur-concave if for all x, y R n such that y majorizes x we have φ (x) φ (y). We say that φ is Schur-convex if φ is Schur-concave. An important class of Schur-convex functions is the following (Theorem 3.C.1 in [11]): Example 4.1 If g : R R is convex then the symmetric convex function φ (x) = n g (x i ) is Schur-convex. By definition, if g : R R is concave then the symmetric concave function φ (x) = n g (x i ) is Schur-concave. Observe that the map x x x+σ 2 is concave in x and hence the symmetric concave map (λ 1,..., λ ) is Schur-concave (see Example 4.1). Then we have λ i λ i + σ 2 By hypothesis, SIR i and hence, λ i λ i + σ 2 = p p + σ 2 p p + σ 2 K 1 + p (17) p + σ 2 12

13 Kσ 2 which implies that p. Since each p (1+) K i P it follows that p K. We then P conclude that K < ( ) σ2 P. To see this is sufficient also: suppose K < ( ) σ2 P. We use the same allocation scheme as in the proof of Theorem 3.1, namely, signature sequences to be WBE sequences and powers p i = p = K We have, as in the proof of Theorem 3.1, the achieved SIR of each user is equal to. We only need to verify that our choice of powers does not exceed the constraint P. Using the prior K < ( ) σ2 P we have for each user power σ 2 p i = σ K P Thus the K users are admissible in the system. The proof of the characterization of user capacity allows us to conclude an optimality property of the specific allocation scheme used above: suppose K users are admissible in the system with processing gain. Then for any valid allocation (signature sequences S and powers p S 1,..., ps K ), from (17), we have that K p S i Kσ K (18) For the allocation in the proofs of Theorems 3.1 and 4.1, the lower bound in (18) is met with equality. We conclude that: 1. The allocation of WBE sequences and powers all equal to p = σ2, gives the smallest 1+ 1 K sum of received powers among all valid allocations. In this sense, this allocation is optimal. 2. Since with this allocation the MMSE linear receiver for each user is just the corresponding scaled matched filter receiver (as seen in (14)), we have: Corollary 4.2 K users (each having SIR requirement ) are admissible in the system with processing gain and received power constraint P and equipped with matched filter receivers if and only if K < ( σ2 P 4.2 Comparison with Random Sequences We saw from the comparison in Section 3 that asymptotically (in a large system, where number of users K, processing gain and K α) there is no loss in user capacity with MMSE receivers while using random sequences. It is interesting to compare the results when there is a received power constraint. From the results in [17], we summarize: 13 )

14 1. From Section 5 in [17] we conclude that with a received power constraint P, users have their SIR requirement achieved (using MMSE receiver) if and only if α < (1 + )σ2 P The user capacity is thus strictly less than that with optimal sequences, when the power constraint is finite. To understand why, we can appeal to (8): K λ i MMSE i = K (19) λ i + σ 2 where λ i s are the eigenvalues of the matrix SDS t. When the background noise power is small compared to the received powers, any set of sequences which symmetrizes the MMSE for all users are optimal. When σ 2 is non-negligible, good sequences should also minimize the right hand side as well. The WBE sequences achieve that by making the eigenvalues least spread out, i.e. all the same. Using random sequences, the eigenvalues are more spread out, resulting in a user capacity penalty when σ 2 is nonnegligible. 2. When matched filters are used, following Section 5 in [17], we conclude that users can meet their target SIR requirement if and only if α < 1 σ2 P when the received power constraint is P. Thus there is a loss in user capacity strictly more than 1 user per degree of freedom when using random sequences when compared with the user capacity achieved with optimal sequences. 5 Multiple Classes, User Capacity, and Optimal Allocations In this section we consider the situation when the users have different SIR requirements and completely generalize the results of the previous two sections. This level of generality of allowing users to have different SIR requirements caters to data and voice users, sharing the common system and having different SIR requirements. As earlier, we assume, without loss of generality, that the number of users is bigger than the processing gain. 5.1 User Capacity Characterization We first define admissibility of K users (with SIR requirements 1, 2,..., K ) in the system with processing gain as being able to allot signature sequences and powers for the users such that for each user i the SIR achieved by the MMSE receiver for that user (as in (4)) is greater than or equal to i (such allocations are called valid). Our main result of this section is an analogue of Theorem 3.1; a complete characterization of admissibility: Theorem 5.1 K users (with SIR requirements 1, 2,..., K ) are admissible in the system with processing gain if and only if K i 1 + i < 14

15 Proof This result motivates the consideration of the quantity as the effective bandwidth 1+ of a user with SIR requirement. Then the criterion of admissibility has a simple interpretation: Users are admissible if and only if the sum of their effective bandwidths is less than the processing gain of the system. Let us denote the effective bandwidth by e () =. 1+ We first show the necessity: since K users are admissible, by definition, there exists a valid allocation of signature sequences s i and powers p i. Since SIR i i, and the effective bandwidth is a monotonic function of the SIR requirement, from (12) we have K i 1 + i < We show that this is also sufficient by explicitly demonstrating a valid allocation. Restricted to the context of this proof, we assume for notational simplicity that the SIR requirements of the users are ordered, i.e., 1 2 K. We look for the unique k {0,..., 1} such that ( k) e ( k ) > K j=k+1 e ( j ) ( k) e ( k+1 ) (20) Say that the users 1,..., k are oversized. If k = 0, then no user is oversized (and this happens when e ( 1 ) K j=1 e ( j )). Observe that oversized users have effective bandwidth large relative to the effective bandwidths of the other users. A simple recursive scheme to enumerate the oversized users follows directly from the definition in (20). Let e i R be the vector (0, 0,..., 0, 1, 0,..., 0) with the entry 1 being in the ith position. Then e 1,..., e form an orthonormal basis for R. Recall that users 1,..., k are oversized. and we know that k <. Consider the following allocation of powers and sequences: 1. For oversized users, we allocate independent channels, i.e., for users in 1,..., k, we allocate the signature sequences e 1,..., e k and powers p i = σ 2 i. 2. For non-oversized users we allocate sequences from the subspace span {e k+1,..., e K } which has dimension k. From (20), it follows that K i=k+1 e ( i ) ( k) e ( k+1 ) and hence the vector with with K entries equal to 0 and the other k entries 1 equal to Kj=k+1 e ( k j ) majorizes the vector (e ( j ), j = k + 1,..., K) (see Example 3.1). ow, appealing to Lemma 3.1, there exists a symmetric matrix, say P, with 1 diagonal entries (e ( j ), j = k + 1,..., K) and eigenvalues Kj=k+1 e ( k j ) and 0 with multiplicities (both algebraic and geometric) equal to k and K respectively. Let v 1,..., v k R 1 K k be orthonormal eigenvectors of P corresponding to 1 the eigenvalue Kj=k+1 e ( k j ). ow, for every user j = k + 1,..., K choose power proportional to its effective bandwidth, namely, p j = c e ( j ) ; where constant c = ( k) σ 2 k K l=k+1 e ( l ) (21) Observe that c is positive by the hypothesis K e ( i ) = K i 1+ i <. 15

16 Let D be the diagonal matrix with entries p j, j = k + 1,..., K. For j = k + 1,..., K, define sequences s j R 1 (K k) and the matrix S = [ s j j = k + 1,..., K] as c Kj=k+1 e ( j ) S = k v 1 v 2. v k Since the diagonal entries of S t S are unity, sj have unit norm for every j = k+1,..., K. Also, note that S D S t = c K j=k+1 e ( j ) I (22) k We denote such sequences as generalized WBE sequences. ote that when D is a scaled identity, the sequences reduce to the WBE sequences. Appendix A discusses the construction of generalized WBE sequences. ow allocate signature sequences for users not oversized as follows: D 1 2 s j = (0,..., 0, s j ) S 1 1 j = k + 1,..., K With this allocation of sequences and powers we now have, Z = SDS t + σ 2 I = σ2 diag {1 + i, i = 1,..., k} 0 0 σ 2 + c K j=k+1 e( j) k I (23) Substituting in (5), SIR i = i i = 1,..., k SIR j = s t j Z 1 s j p j 1 s t jz 1 s j p j j = k + 1,..., K = ( k) p j ( k) σ 2 + c K l=k+1 e ( l ) ( k) p j = j (24) Thus each user has its SIR requirement met which completes the proof. This characterization of admissibility along with the valid allocation scheme above allows us to make the following remarks: 1. It is interesting to observe that the linearity of the boundary of the user capacity is a consequence of (9), that the total minimum mean-square errors of the users is a constant independent of the received powers and dependent very weakly on the signature sequences. This also explains why here, as in the single class case, random sequences achieve asymptotically (as the processing gain gets large) the same performance as optimal sequences. 16

17 2. In practice, one can imagine a small number of different SIR requirements of the users (say two or three). We introduce the notion of different classes of users; all users of the same class have a common SIR requirement. We assume there are L classes (fixed) and users of class l have SIR requirement l. We know (from Section 3) that degrees of freedom can support ( ) users each with SIR requirement. This suggests that we could channelize the system such that users of different classes do not interfere with each other and asymptotically achieve α l users of class l per degree of freedom whenever L α l l l=1 1+ l < 1. This is indeed true and the following statement can be verified: We can admit at least k l = α l 1 1 l users of class l in a system with processing gain where α 1,..., α positive such that L l=1 α l l 1+ l < We can identify two important situations when there are no oversized users: (a) When all the SIR requirements are identical, then no user is oversized. This is the result contained in Theorem 3.1. (b) When there are at least as many users in each class as the processing gain of the system then it is straightforward to see that that there are no oversized users. Suppose class l has K l users and K l l l=1 1+ l <. Then, we can make a familiar valid allocation: signature sequences for the K l users of class l to be WBE sequences (this can be done by the hypothesis that K l ) and powers the same for every user i of class l to be p l i = pl = l 1+ σ 2 l L K j j. The SIR of j=1 1+ j user i of class l is, as in (5) can be verified to be exactly. This ensures that for every class l, K l users of that class are admissible in the system. 4. In the proof of Theorem 5.1, the assumption that the SIR requirements of the users be ordered was for notational simplicity. Equivalently, the notion of oversized users could be introduced (with no assumption on the ordering) as below 1 : User i is defined to be oversized if Kj=1 e ( j ) 1 {e(i )>e( e ( i ) > j )} K (25) j=1 1 {e(j ) e( i )} Denote the set of oversized users as K. Then, (20) can be written in this notation as: ( K ) min e ( i) > e ( j ) ( K ) max e ( i) i K i K j K We observe that there can be utmost -1 oversized users and that if user i is oversized then every user with SIR requirement at least i is also oversized. In the rest of the paper we adhere to this notation. 5. For the specific valid allocation demonstrated in the proof of Theorem 5.1, we can calculate the MMSE receiver for the users (from (3)) to be: c i = s i i K c j = Z 1 j s j j K 1 We would like to thank Prof. Sergio Verdú for suggesting this terminology. 17

18 = σ 2 I + 1 p k s k s t k s j k j = ( σ 2 I p j s j s t j + SDSt) 1 sj = ( σ 2 I p j s j s t j + S D S t) 1 sj ; from (23) = ( σ 2 I p j s j s t j + c 1 l K e ( l ) I) s j ; from (22) = a j s j where a j is a constant (which is easily seen to be (1 + j ) ( 1 1 K k K e ( k ) ) ). Thus the MMSE receiver is just the scaled matched filter receiver for each user. This allows us to conclude, exactly as in Section 3, that there is no loss in user capacity when we restrict the system to use the a priori inferior matched filter. To emphasize: Corollary 5.2 K users (with SIR requirements 1,..., K ) are admissible in the system with processing gain and equipped with matched filter receivers if and only if K i 1 + i < 5.2 Optimal allocation of powers and sequences We proved Theorem 5.1 by explicitly demonstrating a valid allocation scheme. We now identify the nature of optimality of this allocation scheme. This is a generalization of the ideas in Section 4 to the situation when users have different SIR requirements. The key observation used in Section 4 to characterize the optimality of WBE sequences was (8) which related the eigenvalues of SDS t and the MMSEs of the users (and hence the attained SIRs of the users; using (10)). We now strengthen (8) to obtain the precise relationship between the eigenvalues of SDS t and the attained SIRs of the users using the MMSE receiver structure: Fix K >, the signature sequence matrix S and the diagonal matrix of user powers D. Suppose the MMSE receiver structure is used and the attained SIRs of the users are 1,..., K. Then appealing to (6) and (10) we have that the diagonal entries of the matrix D 1 2 S t [SDS t + σ 2 I] 1 SD 1 2 are ,..., K 1+ K. ow, if we denote the eigenvalues of SDS t by λ 1,..., λ it is straightforward to verify that the K K matrix D 1 2 S t [SDS t + σ 2 I] 1 SD 1 2 λ has eigenvalues equal to 1 λ σ 2 +λ 1,..., σ 2 +λ and the remaining K eigenvalues equal to 0. Hence, by an appeal to Lemma 3.1 ( ) λ1 λ,...,, 0..., 0 σ 2 + λ 1 σ 2 + λ majorizes ( ,..., K 1 + K Observe that the conservation law mentioned in (8) follows directly from (26) above. The statement that (26) is the precise relationship between the eigenvalues of SDS t and the attained SIRs of the users is made clear by the following observation: 18 ) (26)

19 Suppose we are given y 1,..., y [0, 1) and 1,..., K 0 such that ( ) 1 K (y 1,..., y, 0,... 0) majorizes,..., K Then the claim is that there exists an allocation of signature sequences S and user powers D such that SDS t σ 2 y 1 σ 2 y has eigenvalues,..., (28) 1 y 1 1 y (27) The attained SIRs of the users are 1,..., K (29) To see this, consider the following construction of S and D. Given y 1,..., y [0, 1) and 1,..., K 0 satisfying (27), by an appeal to Lemma 3.1, there exists a K K symmetric matrix H with diagonal entries ,..., K 1+ K and eigenvalues y 1,..., y, 0,..., 0. Denote λ i = σ2 y i 1 y i for each i = 1... and let Λ = diag {λ 1,..., λ }. Let Û be the K matrix with columns the normalized eigenvectors of H corresponding to the eigenvalues y 1,..., y. Then H = Û ( Λ + σ 2 I ) 1 Λ Û t (30) Define p 1,..., p K to be the diagonal entries of the K K matrix ÛΛÛ t and D to be the diagonal matrix with diagonal entries p 1,..., p K. ow define the signature sequence matrix S by S = QΛ 1 2 Û t D 1 2 for some orthonormal matrix Q. Then observe that: 1. The columns of S have unit norm. 2. SDS t = QΛ 1 2 Û t UΛ 1 2 Q t = QΛQ t has eigenvalues λ 1,..., λ be definition. 3. The SIRs attained by the users are 1,..., K. To see this, note that D [ 1 2 S t SDS t + σ 2 I ] 1 ( 1 SD 2 = ÛΛ1 2 Λ + σ 2 I ) 1 1 Λ 2 Û t and by definition the diagonal entries of H are = H using (30) ,..., K 1+ K. Hence by construction we have demonstrated the existence of signature sequences S and powers D so that both (28) and (29) are met. We now use the observation in (26) and (27) to characterize the optimality of our signature sequence and power allocation. ow suppose we are given that the necessary condition K i 1+ i < in Theorem 5.1 is true. Then by Theorem 5.1 there exists some S and some D such that the achieved SIRs of the users are 1,..., K. If we denote λ 1,..., λ as the eigenvalues of SDS t and y i = λ i σ 2 +λ i, i = 1... then (27) shows the relationship between y 1,..., y and 1,..., K. ow, K p i = tr [ SDS t] see (16) = σ 2 y i 1 y i (31) 19

20 The lemma below identifies a lower bound on K p i. Recall that the set of oversized users is denoted by K. Lemma 5.1 Let K be the set of oversized users. Given the constraint (27), min { y i 1 y i } = i + ( K ) j K e ( j ) i K K j K e ( j ) (32) Suppose true. Then for any allocation of sequences and powers so that the SIR requirements of the users are met, (32) can be used in conjunction with (31) to obtain a lower bound on the sum of allocated received powers: K p i σ 2 ( i K i + ( K ) ) j K e ( j ) K j K e ( j ) It is now straightforward to verify that the sum of powers allocated in the sufficiency proof of Theorem 5.1 (in (21)) meets this lower bound. Thus, our specific valid allocation of sequences and powers is optimal in the above sense of minimizing the sum of allocated powers. We now prove the lemma. Proof of Lemma 5.1: Let us develop some notation by defining the set over which y 1,..., y vary. Rewriting (27), let = { (y 1,..., y ) R + : (y 1,..., y, 0,..., 0) majorizes (e ( 1 ),..., e ( K )) } (33) Observe that the map x x is convex and hence the symmetric convex map f(y) = 1 x y i 1 y i is Schur-convex (see Definition 4.1 and Example 4.1). Hence if y majorizes ỹ then f(y) > f(ỹ). We now complete the proof of Lemma 5.1 by identifying a Schur-minimal element in. Let the set of oversized users be denoted by K. Let y = (y1,..., y ) R + be ( ) y j K e ( j ) = K,..., j K e ( j ) K, e ( i) ; i K (34) Consider the following claims: y (35) y majorizes y y (36) Suppose these are true. Then f (y ) is the minimum value of the minimization problem in (32) and the claim in Lemma 5.1 is now straightforward to verify. We only need to prove (35) and (36) above. It is straightforward to verify from the definition of y and by properties of oversized users that y. Let y = (y 1,..., y ) and y [1],... y [] denote the order statistics of y (see Definition 3.1 for the notation). Let [1],..., [K] be the order statistics of 1,..., K. 20

21 By the definition of y in (34) and properties of oversized users, it can be verified that the following relation is true among the elements of y : { K y[1] e ( i ) = max, e ( ) } [1] (37) K e ( y[k+1] i ) k y[i] = max, e ( ) k ( ( ) ) [k+1] + e [i] y k [i] k = Hence k = we can write k+1 { k+1 y[i] = max e ( [i] ), Kj=1 e ( j ) k + k 1 k } k y[i] (38) ow, since y we have y i = K e ( i ) and hence y [1] y [1] e ( ) [1]. Hence, { K e ( i ) y [1] max, e ( ) } [1] = y[1] K e( i). Furthermore, We complete the proof of the claim that y majorizes y by induction. Suppose k y [i] k y[i] for some 1 k <. Since k y [k+i] = K j=1 e ( j ) k y [i] and y [k+1] y [k+2] K j=1... y [], we have y [k+1] e( k j) y [i]. Hence k k+1 y [i] K ( ) e ( i ) k 1 k + k k K ( ) e ( i ) k 1 k + k k y [i] y[i] by induction hypothesis (39) Since ( k+1 y[i] e ( )) [i] 0, from (39), we have k+1 y [i] max = k+1 { k+1 e ( [i] ), Kj=1 e ( j ) k y [i] from (38) + k 1 k } k y[i] This is true for all k = Hence y majorizes y and y is a Schur-minimal element of. 6 Downlink and User Capacity Until now, we have been considering the uplink of the cellular system. In the downlink of this system there is a single transmitter (the base station) and there are multiple receivers (the users). We first formally define our model and then consider the user capacity of the downlink. 21

22 6.1 Definitions and Model Suppose there are K users in the downlink of the system. Let the path gain from the base station (interchangeably referred to as transmitter) to user i be h i. We suppose that the noise at the receivers is additive white Gaussian with the same variance σ 2 per degree of freedom for each user (there is no loss of generality in this assumption since we can incorporate this into the path gain parameter h i ). We say that K users (with path gains from the base station being h 1,..., h K and each having the same SIR requirement of ) are admissible in the downlink of the system with processing gain if we can allot transmit power p i and signature sequence s i at the transmitter corresponding to user i SIR i = p i h i (s i, c i ) 2 σ 2 (c i, c i ) + j i p j h i (s j, c i ) 2 (40) where c i is the MMSE linear receiver given the signature sequences and the powers. Proceeding as in Section 2.1, it is easy to verify that the optimal (in the sense of maximizing SIR for each user) linear receiver c i for user i is c i = Z 1 i s i (41) where Z i = σ2 h i I + j i p j s j s t j and the corresponding SIR i with the optimal receiver is SIR i = s t i Z 1 i s i p i (42) It is clear that we can make a similar definition of admissibility of the users when the receiver structure is fixed to be the matched filter. The similarity of the achieved SIR equation (40) to the corresponding one in the uplink in (2) is apparent. Only the noise variance σ 2 in (2) is replaced now by σ2 h i. If we have no constraints on the allocated power we can null out the additive noise and the admissibility characterization is identical to that of uplink. 6.2 User Capacity Characterization Theorem 6.1 K users with path gains h 1,..., h K from the base station and each having the same SIR requirement are admissible in the downlink of the system with processing gain if and only if ( ) K < Proof We first show the necessity, on the same lines of the uplink situation. Suppose the K users are admissible in the downlink. Then, for each user i, there exists signature sequence s i and transmit power at the base station p i (as a function of the path gains h 1,..., h K ) such that the achieved SIR of user i (as in (40)) is greater than or equal to. Using (42) Proceeding as in (5), we have, for each user i, s t i s t i Z 1 i s i p i =. Z 1 i s i p i (43) stiẑ 1 i s i p i (44) 1 s t iẑ 1 i s i p i 22

Optimal Sequences and Sum Capacity of Synchronous CDMA Systems

Optimal Sequences and Sum Capacity of Synchronous CDMA Systems Optimal Sequences and Sum Capacity of Synchronous CDMA Systems Pramod Viswanath and Venkat Anantharam {pvi, ananth}@eecs.berkeley.edu EECS Department, U C Berkeley CA 9470 Abstract The sum capacity of

More information

CDMA Systems in Fading Channels: Admissibility, Network Capacity, and Power Control

CDMA Systems in Fading Channels: Admissibility, Network Capacity, and Power Control 962 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 46, NO. 3, MAY 2000 CDMA Systems in Fading Channels: Admissibility, Network Capacity, and Power Control Junshan Zhang, Student Member, IEEE, and Edwin

More information

Multiuser Receivers, Random Matrices and Free Probability

Multiuser Receivers, Random Matrices and Free Probability Multiuser Receivers, Random Matrices and Free Probability David N.C. Tse Department of Electrical Engineering and Computer Sciences University of California Berkeley, CA 94720, USA dtse@eecs.berkeley.edu

More information

DS-GA 1002 Lecture notes 0 Fall Linear Algebra. These notes provide a review of basic concepts in linear algebra.

DS-GA 1002 Lecture notes 0 Fall Linear Algebra. These notes provide a review of basic concepts in linear algebra. DS-GA 1002 Lecture notes 0 Fall 2016 Linear Algebra These notes provide a review of basic concepts in linear algebra. 1 Vector spaces You are no doubt familiar with vectors in R 2 or R 3, i.e. [ ] 1.1

More information

Multiuser Capacity in Block Fading Channel

Multiuser Capacity in Block Fading Channel Multiuser Capacity in Block Fading Channel April 2003 1 Introduction and Model We use a block-fading model, with coherence interval T where M independent users simultaneously transmit to a single receiver

More information

Design of MMSE Multiuser Detectors using Random Matrix Techniques

Design of MMSE Multiuser Detectors using Random Matrix Techniques Design of MMSE Multiuser Detectors using Random Matrix Techniques Linbo Li and Antonia M Tulino and Sergio Verdú Department of Electrical Engineering Princeton University Princeton, New Jersey 08544 Email:

More information

Optimum Signature Sequence Sets for. Asynchronous CDMA Systems. Abstract

Optimum Signature Sequence Sets for. Asynchronous CDMA Systems. Abstract Optimum Signature Sequence Sets for Asynchronous CDMA Systems Sennur Ulukus AT&T Labs{Research ulukus@research.att.com Abstract Roy D.Yates WINLAB, Rutgers University ryates@winlab.rutgers.edu In this

More information

Optimal Power Control in Decentralized Gaussian Multiple Access Channels

Optimal Power Control in Decentralized Gaussian Multiple Access Channels 1 Optimal Power Control in Decentralized Gaussian Multiple Access Channels Kamal Singh Department of Electrical Engineering Indian Institute of Technology Bombay. arxiv:1711.08272v1 [eess.sp] 21 Nov 2017

More information

Information Theory for Wireless Communications, Part II:

Information Theory for Wireless Communications, Part II: Information Theory for Wireless Communications, Part II: Lecture 5: Multiuser Gaussian MIMO Multiple-Access Channel Instructor: Dr Saif K Mohammed Scribe: Johannes Lindblom In this lecture, we give the

More information

ANALYSIS OF A PARTIAL DECORRELATOR IN A MULTI-CELL DS/CDMA SYSTEM

ANALYSIS OF A PARTIAL DECORRELATOR IN A MULTI-CELL DS/CDMA SYSTEM ANAYSIS OF A PARTIA DECORREATOR IN A MUTI-CE DS/CDMA SYSTEM Mohammad Saquib ECE Department, SU Baton Rouge, A 70803-590 e-mail: saquib@winlab.rutgers.edu Roy Yates WINAB, Rutgers University Piscataway

More information

Characterization of Convex and Concave Resource Allocation Problems in Interference Coupled Wireless Systems

Characterization of Convex and Concave Resource Allocation Problems in Interference Coupled Wireless Systems 2382 IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL 59, NO 5, MAY 2011 Characterization of Convex and Concave Resource Allocation Problems in Interference Coupled Wireless Systems Holger Boche, Fellow, IEEE,

More information

Lecture 8: MIMO Architectures (II) Theoretical Foundations of Wireless Communications 1. Overview. Ragnar Thobaben CommTh/EES/KTH

Lecture 8: MIMO Architectures (II) Theoretical Foundations of Wireless Communications 1. Overview. Ragnar Thobaben CommTh/EES/KTH MIMO : MIMO Theoretical Foundations of Wireless Communications 1 Wednesday, May 25, 2016 09:15-12:00, SIP 1 Textbook: D. Tse and P. Viswanath, Fundamentals of Wireless Communication 1 / 20 Overview MIMO

More information

Advanced 3 G and 4 G Wireless Communication Prof. Aditya K Jagannathan Department of Electrical Engineering Indian Institute of Technology, Kanpur

Advanced 3 G and 4 G Wireless Communication Prof. Aditya K Jagannathan Department of Electrical Engineering Indian Institute of Technology, Kanpur Advanced 3 G and 4 G Wireless Communication Prof. Aditya K Jagannathan Department of Electrical Engineering Indian Institute of Technology, Kanpur Lecture - 19 Multi-User CDMA Uplink and Asynchronous CDMA

More information

Optimum Power Allocation in Fading MIMO Multiple Access Channels with Partial CSI at the Transmitters

Optimum Power Allocation in Fading MIMO Multiple Access Channels with Partial CSI at the Transmitters Optimum Power Allocation in Fading MIMO Multiple Access Channels with Partial CSI at the Transmitters Alkan Soysal Sennur Ulukus Department of Electrical and Computer Engineering University of Maryland,

More information

Output MAI Distributions of Linear MMSE Multiuser Receivers in DS-CDMA Systems

Output MAI Distributions of Linear MMSE Multiuser Receivers in DS-CDMA Systems 1128 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 47, NO. 3, MARCH 2001 Output MAI Distributions of Linear MMSE Multiuser Receivers in DS-CDMA Systems Junshan Zhang, Member, IEEE, Edwin K. P. Chong, Senior

More information

On Network Interference Management

On Network Interference Management On Network Interference Management Aleksandar Jovičić, Hua Wang and Pramod Viswanath March 3, 2008 Abstract We study two building-block models of interference-limited wireless networks, motivated by the

More information

Power Control in Multi-Carrier CDMA Systems

Power Control in Multi-Carrier CDMA Systems A Game-Theoretic Approach to Energy-Efficient ower Control in Multi-Carrier CDMA Systems Farhad Meshkati, Student Member, IEEE, Mung Chiang, Member, IEEE, H. Vincent oor, Fellow, IEEE, and Stuart C. Schwartz,

More information

Random Matrices and Wireless Communications

Random Matrices and Wireless Communications Random Matrices and Wireless Communications Jamie Evans Centre for Ultra-Broadband Information Networks (CUBIN) Department of Electrical and Electronic Engineering University of Melbourne 3.5 1 3 0.8 2.5

More information

Distributed Power Control for Time Varying Wireless Networks: Optimality and Convergence

Distributed Power Control for Time Varying Wireless Networks: Optimality and Convergence Distributed Power Control for Time Varying Wireless Networks: Optimality and Convergence Tim Holliday, Nick Bambos, Peter Glynn, Andrea Goldsmith Stanford University Abstract This paper presents a new

More information

On the Capacity of the Multiple Antenna Broadcast Channel

On the Capacity of the Multiple Antenna Broadcast Channel DIMACS Series in Discrete Mathematics and Theoretical Computer Science On the Capacity of the Multiple Antenna Broadcast Channel David Tse and Pramod Viswanath Abstract. The capacity region of the multiple

More information

Shannon meets Wiener II: On MMSE estimation in successive decoding schemes

Shannon meets Wiener II: On MMSE estimation in successive decoding schemes Shannon meets Wiener II: On MMSE estimation in successive decoding schemes G. David Forney, Jr. MIT Cambridge, MA 0239 USA forneyd@comcast.net Abstract We continue to discuss why MMSE estimation arises

More information

The Hilbert Space of Random Variables

The Hilbert Space of Random Variables The Hilbert Space of Random Variables Electrical Engineering 126 (UC Berkeley) Spring 2018 1 Outline Fix a probability space and consider the set H := {X : X is a real-valued random variable with E[X 2

More information

MULTICARRIER code-division multiple access (MC-

MULTICARRIER code-division multiple access (MC- IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 51, NO. 2, FEBRUARY 2005 479 Spectral Efficiency of Multicarrier CDMA Antonia M. Tulino, Member, IEEE, Linbo Li, and Sergio Verdú, Fellow, IEEE Abstract We

More information

Morning Session Capacity-based Power Control. Department of Electrical and Computer Engineering University of Maryland

Morning Session Capacity-based Power Control. Department of Electrical and Computer Engineering University of Maryland Morning Session Capacity-based Power Control Şennur Ulukuş Department of Electrical and Computer Engineering University of Maryland So Far, We Learned... Power control with SIR-based QoS guarantees Suitable

More information

Performance Analysis of Spread Spectrum CDMA systems

Performance Analysis of Spread Spectrum CDMA systems 1 Performance Analysis of Spread Spectrum CDMA systems 16:33:546 Wireless Communication Technologies Spring 5 Instructor: Dr. Narayan Mandayam Summary by Liang Xiao lxiao@winlab.rutgers.edu WINLAB, Department

More information

IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 2, FEBRUARY Uplink Downlink Duality Via Minimax Duality. Wei Yu, Member, IEEE (1) (2)

IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 2, FEBRUARY Uplink Downlink Duality Via Minimax Duality. Wei Yu, Member, IEEE (1) (2) IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 2, FEBRUARY 2006 361 Uplink Downlink Duality Via Minimax Duality Wei Yu, Member, IEEE Abstract The sum capacity of a Gaussian vector broadcast channel

More information

FRAMES IN QUANTUM AND CLASSICAL INFORMATION THEORY

FRAMES IN QUANTUM AND CLASSICAL INFORMATION THEORY FRAMES IN QUANTUM AND CLASSICAL INFORMATION THEORY Emina Soljanin Mathematical Sciences Research Center, Bell Labs April 16, 23 A FRAME 1 A sequence {x i } of vectors in a Hilbert space with the property

More information

On the Required Accuracy of Transmitter Channel State Information in Multiple Antenna Broadcast Channels

On the Required Accuracy of Transmitter Channel State Information in Multiple Antenna Broadcast Channels On the Required Accuracy of Transmitter Channel State Information in Multiple Antenna Broadcast Channels Giuseppe Caire University of Southern California Los Angeles, CA, USA Email: caire@usc.edu Nihar

More information

Lecture 5: Antenna Diversity and MIMO Capacity Theoretical Foundations of Wireless Communications 1. Overview. CommTh/EES/KTH

Lecture 5: Antenna Diversity and MIMO Capacity Theoretical Foundations of Wireless Communications 1. Overview. CommTh/EES/KTH : Antenna Diversity and Theoretical Foundations of Wireless Communications Wednesday, May 4, 206 9:00-2:00, Conference Room SIP Textbook: D. Tse and P. Viswanath, Fundamentals of Wireless Communication

More information

These outputs can be written in a more convenient form: with y(i) = Hc m (i) n(i) y(i) = (y(i); ; y K (i)) T ; c m (i) = (c m (i); ; c m K(i)) T and n

These outputs can be written in a more convenient form: with y(i) = Hc m (i) n(i) y(i) = (y(i); ; y K (i)) T ; c m (i) = (c m (i); ; c m K(i)) T and n Binary Codes for synchronous DS-CDMA Stefan Bruck, Ulrich Sorger Institute for Network- and Signal Theory Darmstadt University of Technology Merckstr. 25, 6428 Darmstadt, Germany Tel.: 49 65 629, Fax:

More information

On the complexity of maximizing the minimum Shannon capacity in wireless networks by joint channel assignment and power allocation

On the complexity of maximizing the minimum Shannon capacity in wireless networks by joint channel assignment and power allocation On the complexity of maximizing the minimum Shannon capacity in wireless networks by joint channel assignment and power allocation Mikael Fallgren Royal Institute of Technology December, 2009 Abstract

More information

LECTURE 18. Lecture outline Gaussian channels: parallel colored noise inter-symbol interference general case: multiple inputs and outputs

LECTURE 18. Lecture outline Gaussian channels: parallel colored noise inter-symbol interference general case: multiple inputs and outputs LECTURE 18 Last time: White Gaussian noise Bandlimited WGN Additive White Gaussian Noise (AWGN) channel Capacity of AWGN channel Application: DS-CDMA systems Spreading Coding theorem Lecture outline Gaussian

More information

Competition and Cooperation in Multiuser Communication Environments

Competition and Cooperation in Multiuser Communication Environments Competition and Cooperation in Multiuser Communication Environments Wei Yu Electrical Engineering Department Stanford University April, 2002 Wei Yu, Stanford University Introduction A multiuser communication

More information

Lecture 7 MIMO Communica2ons

Lecture 7 MIMO Communica2ons Wireless Communications Lecture 7 MIMO Communica2ons Prof. Chun-Hung Liu Dept. of Electrical and Computer Engineering National Chiao Tung University Fall 2014 1 Outline MIMO Communications (Chapter 10

More information

Duke University, Department of Electrical and Computer Engineering Optimization for Scientists and Engineers c Alex Bronstein, 2014

Duke University, Department of Electrical and Computer Engineering Optimization for Scientists and Engineers c Alex Bronstein, 2014 Duke University, Department of Electrical and Computer Engineering Optimization for Scientists and Engineers c Alex Bronstein, 2014 Linear Algebra A Brief Reminder Purpose. The purpose of this document

More information

Upper Bounds on MIMO Channel Capacity with Channel Frobenius Norm Constraints

Upper Bounds on MIMO Channel Capacity with Channel Frobenius Norm Constraints Upper Bounds on IO Channel Capacity with Channel Frobenius Norm Constraints Zukang Shen, Jeffrey G. Andrews, Brian L. Evans Wireless Networking Communications Group Department of Electrical Computer Engineering

More information

CS168: The Modern Algorithmic Toolbox Lecture #8: How PCA Works

CS168: The Modern Algorithmic Toolbox Lecture #8: How PCA Works CS68: The Modern Algorithmic Toolbox Lecture #8: How PCA Works Tim Roughgarden & Gregory Valiant April 20, 206 Introduction Last lecture introduced the idea of principal components analysis (PCA). The

More information

Appendix B Information theory from first principles

Appendix B Information theory from first principles Appendix B Information theory from first principles This appendix discusses the information theory behind the capacity expressions used in the book. Section 8.3.4 is the only part of the book that supposes

More information

Vector Channel Capacity with Quantized Feedback

Vector Channel Capacity with Quantized Feedback Vector Channel Capacity with Quantized Feedback Sudhir Srinivasa and Syed Ali Jafar Electrical Engineering and Computer Science University of California Irvine, Irvine, CA 9697-65 Email: syed@ece.uci.edu,

More information

Transmit Directions and Optimality of Beamforming in MIMO-MAC with Partial CSI at the Transmitters 1

Transmit Directions and Optimality of Beamforming in MIMO-MAC with Partial CSI at the Transmitters 1 2005 Conference on Information Sciences and Systems, The Johns Hopkins University, March 6 8, 2005 Transmit Directions and Optimality of Beamforming in MIMO-MAC with Partial CSI at the Transmitters Alkan

More information

NOMA: Principles and Recent Results

NOMA: Principles and Recent Results NOMA: Principles and Recent Results Jinho Choi School of EECS GIST September 2017 (VTC-Fall 2017) 1 / 46 Abstract: Non-orthogonal multiple access (NOMA) becomes a key technology in 5G as it can improve

More information

Approximately achieving the feedback interference channel capacity with point-to-point codes

Approximately achieving the feedback interference channel capacity with point-to-point codes Approximately achieving the feedback interference channel capacity with point-to-point codes Joyson Sebastian*, Can Karakus*, Suhas Diggavi* Abstract Superposition codes with rate-splitting have been used

More information

Spanning and Independence Properties of Finite Frames

Spanning and Independence Properties of Finite Frames Chapter 1 Spanning and Independence Properties of Finite Frames Peter G. Casazza and Darrin Speegle Abstract The fundamental notion of frame theory is redundancy. It is this property which makes frames

More information

Math 350 Fall 2011 Notes about inner product spaces. In this notes we state and prove some important properties of inner product spaces.

Math 350 Fall 2011 Notes about inner product spaces. In this notes we state and prove some important properties of inner product spaces. Math 350 Fall 2011 Notes about inner product spaces In this notes we state and prove some important properties of inner product spaces. First, recall the dot product on R n : if x, y R n, say x = (x 1,...,

More information

926 IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 53, NO. 3, MARCH Monica Nicoli, Member, IEEE, and Umberto Spagnolini, Senior Member, IEEE (1)

926 IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 53, NO. 3, MARCH Monica Nicoli, Member, IEEE, and Umberto Spagnolini, Senior Member, IEEE (1) 926 IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 53, NO. 3, MARCH 2005 Reduced-Rank Channel Estimation for Time-Slotted Mobile Communication Systems Monica Nicoli, Member, IEEE, and Umberto Spagnolini,

More information

Dirty Paper Coding vs. TDMA for MIMO Broadcast Channels

Dirty Paper Coding vs. TDMA for MIMO Broadcast Channels TO APPEAR IEEE INTERNATIONAL CONFERENCE ON COUNICATIONS, JUNE 004 1 Dirty Paper Coding vs. TDA for IO Broadcast Channels Nihar Jindal & Andrea Goldsmith Dept. of Electrical Engineering, Stanford University

More information

Secure Degrees of Freedom of the MIMO Multiple Access Wiretap Channel

Secure Degrees of Freedom of the MIMO Multiple Access Wiretap Channel Secure Degrees of Freedom of the MIMO Multiple Access Wiretap Channel Pritam Mukherjee Sennur Ulukus Department of Electrical and Computer Engineering University of Maryland, College Park, MD 074 pritamm@umd.edu

More information

Elementary linear algebra

Elementary linear algebra Chapter 1 Elementary linear algebra 1.1 Vector spaces Vector spaces owe their importance to the fact that so many models arising in the solutions of specific problems turn out to be vector spaces. The

More information

Lecture Notes 1: Vector spaces

Lecture Notes 1: Vector spaces Optimization-based data analysis Fall 2017 Lecture Notes 1: Vector spaces In this chapter we review certain basic concepts of linear algebra, highlighting their application to signal processing. 1 Vector

More information

ELEC E7210: Communication Theory. Lecture 10: MIMO systems

ELEC E7210: Communication Theory. Lecture 10: MIMO systems ELEC E7210: Communication Theory Lecture 10: MIMO systems Matrix Definitions, Operations, and Properties (1) NxM matrix a rectangular array of elements a A. an 11 1....... a a 1M. NM B D C E ermitian transpose

More information

Transmitter optimization for distributed Gaussian MIMO channels

Transmitter optimization for distributed Gaussian MIMO channels Transmitter optimization for distributed Gaussian MIMO channels Hon-Fah Chong Electrical & Computer Eng Dept National University of Singapore Email: chonghonfah@ieeeorg Mehul Motani Electrical & Computer

More information

Sum Capacity of the Vector Gaussian Broadcast Channel and Uplink-Downlink Duality

Sum Capacity of the Vector Gaussian Broadcast Channel and Uplink-Downlink Duality Sum Capacity of the Vector Gaussian Broadcast Channel and Uplink-Downlink Duality Pramod Viswanath and David Tse March 22, 2003 Abstract We characterize the sum capacity of the vector Gaussian broadcast

More information

The Optimality of Beamforming: A Unified View

The Optimality of Beamforming: A Unified View The Optimality of Beamforming: A Unified View Sudhir Srinivasa and Syed Ali Jafar Electrical Engineering and Computer Science University of California Irvine, Irvine, CA 92697-2625 Email: sudhirs@uciedu,

More information

Maximizing Sum Rate and Minimizing MSE on Multiuser Downlink: Optimality, Fast Algorithms and Equivalence via Max-min SIR

Maximizing Sum Rate and Minimizing MSE on Multiuser Downlink: Optimality, Fast Algorithms and Equivalence via Max-min SIR 1 Maximizing Sum Rate and Minimizing MSE on Multiuser Downlink: Optimality, Fast Algorithms and Equivalence via Max-min SIR Chee Wei Tan, Mung Chiang ¾ and R. Srikant City University of Hong Kong ¾ Princeton

More information

CS168: The Modern Algorithmic Toolbox Lecture #8: PCA and the Power Iteration Method

CS168: The Modern Algorithmic Toolbox Lecture #8: PCA and the Power Iteration Method CS168: The Modern Algorithmic Toolbox Lecture #8: PCA and the Power Iteration Method Tim Roughgarden & Gregory Valiant April 15, 015 This lecture began with an extended recap of Lecture 7. Recall that

More information

12.4 Known Channel (Water-Filling Solution)

12.4 Known Channel (Water-Filling Solution) ECEn 665: Antennas and Propagation for Wireless Communications 54 2.4 Known Channel (Water-Filling Solution) The channel scenarios we have looed at above represent special cases for which the capacity

More information

Statistical Beamforming on the Grassmann Manifold for the Two-User Broadcast Channel

Statistical Beamforming on the Grassmann Manifold for the Two-User Broadcast Channel 6464 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 59, NO. 10, OCTOBER 2013 Statistical Beamforming on the Grassmann Manifold for the Two-User Broadcast Channel Vasanthan Raghavan, Senior Member, IEEE,

More information

Degrees of Freedom Region of the Gaussian MIMO Broadcast Channel with Common and Private Messages

Degrees of Freedom Region of the Gaussian MIMO Broadcast Channel with Common and Private Messages Degrees of Freedom Region of the Gaussian MIMO Broadcast hannel with ommon and Private Messages Ersen Ekrem Sennur Ulukus Department of Electrical and omputer Engineering University of Maryland, ollege

More information

Signal Design for Bandwidth-Efficient Multiple-Access Communications Based on Eigenvalue Optimization

Signal Design for Bandwidth-Efficient Multiple-Access Communications Based on Eigenvalue Optimization IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 46, NO. 6, SEPTEMBER 2000 2045 Signal Design for Bwidth-Efficient Multiple-Access Communications Based on Eigenvalue Optimization Tommy Guess, Member, IEEE,

More information

Minimum Feedback Rates for Multi-Carrier Transmission With Correlated Frequency Selective Fading

Minimum Feedback Rates for Multi-Carrier Transmission With Correlated Frequency Selective Fading Minimum Feedback Rates for Multi-Carrier Transmission With Correlated Frequency Selective Fading Yakun Sun and Michael L. Honig Department of ECE orthwestern University Evanston, IL 60208 Abstract We consider

More information

Lecture 6 Channel Coding over Continuous Channels

Lecture 6 Channel Coding over Continuous Channels Lecture 6 Channel Coding over Continuous Channels I-Hsiang Wang Department of Electrical Engineering National Taiwan University ihwang@ntu.edu.tw November 9, 015 1 / 59 I-Hsiang Wang IT Lecture 6 We have

More information

Interactive Interference Alignment

Interactive Interference Alignment Interactive Interference Alignment Quan Geng, Sreeram annan, and Pramod Viswanath Coordinated Science Laboratory and Dept. of ECE University of Illinois, Urbana-Champaign, IL 61801 Email: {geng5, kannan1,

More information

Minimum Mean Squared Error Interference Alignment

Minimum Mean Squared Error Interference Alignment Minimum Mean Squared Error Interference Alignment David A. Schmidt, Changxin Shi, Randall A. Berry, Michael L. Honig and Wolfgang Utschick Associate Institute for Signal Processing Technische Universität

More information

Characterization of Rate Region in Interference Channels with Constrained Power

Characterization of Rate Region in Interference Channels with Constrained Power Characterization of Rate Region in Interference Channels with Constrained Power Hajar Mahdavi-Doost, Masoud Ebrahimi, and Amir K. Khandani Coding & Signal Transmission Laboratory Department of Electrical

More information

Optimal Power Allocation for Parallel Gaussian Broadcast Channels with Independent and Common Information

Optimal Power Allocation for Parallel Gaussian Broadcast Channels with Independent and Common Information SUBMIED O IEEE INERNAIONAL SYMPOSIUM ON INFORMAION HEORY, DE. 23 1 Optimal Power Allocation for Parallel Gaussian Broadcast hannels with Independent and ommon Information Nihar Jindal and Andrea Goldsmith

More information

Non white sample covariance matrices.

Non white sample covariance matrices. Non white sample covariance matrices. S. Péché, Université Grenoble 1, joint work with O. Ledoit, Uni. Zurich 17-21/05/2010, Université Marne la Vallée Workshop Probability and Geometry in High Dimensions

More information

IN this paper, we show that the scalar Gaussian multiple-access

IN this paper, we show that the scalar Gaussian multiple-access 768 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 50, NO. 5, MAY 2004 On the Duality of Gaussian Multiple-Access and Broadcast Channels Nihar Jindal, Student Member, IEEE, Sriram Vishwanath, and Andrea

More information

ON BEAMFORMING WITH FINITE RATE FEEDBACK IN MULTIPLE ANTENNA SYSTEMS

ON BEAMFORMING WITH FINITE RATE FEEDBACK IN MULTIPLE ANTENNA SYSTEMS ON BEAMFORMING WITH FINITE RATE FEEDBACK IN MULTIPLE ANTENNA SYSTEMS KRISHNA KIRAN MUKKAVILLI ASHUTOSH SABHARWAL ELZA ERKIP BEHNAAM AAZHANG Abstract In this paper, we study a multiple antenna system where

More information

[y i α βx i ] 2 (2) Q = i=1

[y i α βx i ] 2 (2) Q = i=1 Least squares fits This section has no probability in it. There are no random variables. We are given n points (x i, y i ) and want to find the equation of the line that best fits them. We take the equation

More information

High SNR Analysis for MIMO Broadcast Channels: Dirty Paper Coding vs. Linear Precoding

High SNR Analysis for MIMO Broadcast Channels: Dirty Paper Coding vs. Linear Precoding High SNR Analysis for MIMO Broadcast Channels: Dirty Paper Coding vs. Linear Precoding arxiv:cs/062007v2 [cs.it] 9 Dec 2006 Juyul Lee and Nihar Jindal Department of Electrical and Computer Engineering

More information

Linear and Nonlinear Iterative Multiuser Detection

Linear and Nonlinear Iterative Multiuser Detection 1 Linear and Nonlinear Iterative Multiuser Detection Alex Grant and Lars Rasmussen University of South Australia October 2011 Outline 1 Introduction 2 System Model 3 Multiuser Detection 4 Interference

More information

The Water-Filling Game in Fading Multiple Access Channels

The Water-Filling Game in Fading Multiple Access Channels The Water-Filling Game in Fading Multiple Access Channels Lifeng Lai and Hesham El Gamal arxiv:cs/05203v [cs.it] 3 Dec 2005 February, 2008 Abstract We adopt a game theoretic approach for the design and

More information

On the Limitation of Generalized Welch-Bound Equality Signals

On the Limitation of Generalized Welch-Bound Equality Signals 2220 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 51, NO. 6, JUNE 2005 On the Limitation of Generalized Welch-Bound Equality Signals Ateet apur, Member, IEEE, Mahesh. Varanasi, Senior Member, IEEE, and

More information

Optimal Power Allocation over Parallel Gaussian Broadcast Channels

Optimal Power Allocation over Parallel Gaussian Broadcast Channels Optimal Power Allocation over Parallel Gaussian Broadcast Channels David N.C. Tse Dept. of Electrical Engineering and Computer Sciences University of California at Berkeley email: dtse@eecs.berkeley.edu

More information

THE capacity limits of communication systems subject

THE capacity limits of communication systems subject IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 5, NO., NOVEMBER 6 35 Achieving the Capacity Region Boundary of Fading CDMA Channels via Generalized Iterative Waterfilling Onur Kaya, Member, IEEE, and

More information

Error Exponent Region for Gaussian Broadcast Channels

Error Exponent Region for Gaussian Broadcast Channels Error Exponent Region for Gaussian Broadcast Channels Lihua Weng, S. Sandeep Pradhan, and Achilleas Anastasopoulos Electrical Engineering and Computer Science Dept. University of Michigan, Ann Arbor, MI

More information

Decoupling of CDMA Multiuser Detection via the Replica Method

Decoupling of CDMA Multiuser Detection via the Replica Method Decoupling of CDMA Multiuser Detection via the Replica Method Dongning Guo and Sergio Verdú Dept. of Electrical Engineering Princeton University Princeton, NJ 08544, USA email: {dguo,verdu}@princeton.edu

More information

Approximate Capacity of Fast Fading Interference Channels with no CSIT

Approximate Capacity of Fast Fading Interference Channels with no CSIT Approximate Capacity of Fast Fading Interference Channels with no CSIT Joyson Sebastian, Can Karakus, Suhas Diggavi Abstract We develop a characterization of fading models, which assigns a number called

More information

Single-User MIMO systems: Introduction, capacity results, and MIMO beamforming

Single-User MIMO systems: Introduction, capacity results, and MIMO beamforming Single-User MIMO systems: Introduction, capacity results, and MIMO beamforming Master Universitario en Ingeniería de Telecomunicación I. Santamaría Universidad de Cantabria Contents Introduction Multiplexing,

More information

Under sum power constraint, the capacity of MIMO channels

Under sum power constraint, the capacity of MIMO channels IEEE TRANSACTIONS ON COMMUNICATIONS, VOL 6, NO 9, SEPTEMBER 22 242 Iterative Mode-Dropping for the Sum Capacity of MIMO-MAC with Per-Antenna Power Constraint Yang Zhu and Mai Vu Abstract We propose an

More information

AN EXTERNALITY BASED DECENTRALIZED OPTIMAL POWER ALLOCATION SCHEME FOR WIRELESS MESH NETWORKS

AN EXTERNALITY BASED DECENTRALIZED OPTIMAL POWER ALLOCATION SCHEME FOR WIRELESS MESH NETWORKS AN EXTERNALITY BASED DECENTRALIZED OPTIMAL POWER ALLOCATION SCHEME FOR WIRELESS MESH NETWORKS Shruti Sharma and Demos Teneketzis Department of Electrical Engineering and Computer Science University of

More information

Multi User Detection I

Multi User Detection I January 12, 2005 Outline Overview Multiple Access Communication Motivation: What is MU Detection? Overview of DS/CDMA systems Concept and Codes used in CDMA CDMA Channels Models Synchronous and Asynchronous

More information

AN ELEMENTARY PROOF OF THE SPECTRAL RADIUS FORMULA FOR MATRICES

AN ELEMENTARY PROOF OF THE SPECTRAL RADIUS FORMULA FOR MATRICES AN ELEMENTARY PROOF OF THE SPECTRAL RADIUS FORMULA FOR MATRICES JOEL A. TROPP Abstract. We present an elementary proof that the spectral radius of a matrix A may be obtained using the formula ρ(a) lim

More information

Wideband Fading Channel Capacity with Training and Partial Feedback

Wideband Fading Channel Capacity with Training and Partial Feedback Wideband Fading Channel Capacity with Training and Partial Feedback Manish Agarwal, Michael L. Honig ECE Department, Northwestern University 145 Sheridan Road, Evanston, IL 6008 USA {m-agarwal,mh}@northwestern.edu

More information

Stochastic Design Criteria in Linear Models

Stochastic Design Criteria in Linear Models AUSTRIAN JOURNAL OF STATISTICS Volume 34 (2005), Number 2, 211 223 Stochastic Design Criteria in Linear Models Alexander Zaigraev N. Copernicus University, Toruń, Poland Abstract: Within the framework

More information

Pilot Optimization and Channel Estimation for Multiuser Massive MIMO Systems

Pilot Optimization and Channel Estimation for Multiuser Massive MIMO Systems 1 Pilot Optimization and Channel Estimation for Multiuser Massive MIMO Systems Tadilo Endeshaw Bogale and Long Bao Le Institute National de la Recherche Scientifique (INRS) Université de Québec, Montréal,

More information

Linear Algebra March 16, 2019

Linear Algebra March 16, 2019 Linear Algebra March 16, 2019 2 Contents 0.1 Notation................................ 4 1 Systems of linear equations, and matrices 5 1.1 Systems of linear equations..................... 5 1.2 Augmented

More information

How Much Training and Feedback are Needed in MIMO Broadcast Channels?

How Much Training and Feedback are Needed in MIMO Broadcast Channels? How uch raining and Feedback are Needed in IO Broadcast Channels? ari Kobayashi, SUPELEC Gif-sur-Yvette, France Giuseppe Caire, University of Southern California Los Angeles CA, 989 USA Nihar Jindal University

More information

A Game-Theoretic Framework for Interference Avoidance

A Game-Theoretic Framework for Interference Avoidance IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 57, NO. 4, APRIL 2009 1087 A Game-Theoretic Framework for Interference Avoidance R. Menon, A. B. MacKenzie, Member, IEEE, J. Hicks, Member, IEEE, R. M. Buehrer,

More information

Stat 159/259: Linear Algebra Notes

Stat 159/259: Linear Algebra Notes Stat 159/259: Linear Algebra Notes Jarrod Millman November 16, 2015 Abstract These notes assume you ve taken a semester of undergraduate linear algebra. In particular, I assume you are familiar with the

More information

Optimization in Wireless Communication

Optimization in Wireless Communication Zhi-Quan (Tom) Luo Department of Electrical and Computer Engineering University of Minnesota 200 Union Street SE Minneapolis, MN 55455 2007 NSF Workshop Challenges Optimization problems from wireless applications

More information

Network Calculus. A General Framework for Interference Management and Resource Allocation. Martin Schubert

Network Calculus. A General Framework for Interference Management and Resource Allocation. Martin Schubert Network Calculus A General Framework for Interference Management and Resource Allocation Martin Schubert Fraunhofer Institute for Telecommunications HHI, Berlin, Germany Fraunhofer German-Sino Lab for

More information

Noncooperative Optimization of Space-Time Signals in Ad hoc Networks

Noncooperative Optimization of Space-Time Signals in Ad hoc Networks Noncooperative Optimization of Space-Time Signals in Ad hoc Networks Ronald A. Iltis and Duong Hoang Dept. of Electrical and Computer Engineering University of California Santa Barbara, CA 93106 {iltis,hoang}@ece.ucsb.edu

More information

ELE539A: Optimization of Communication Systems Lecture 15: Semidefinite Programming, Detection and Estimation Applications

ELE539A: Optimization of Communication Systems Lecture 15: Semidefinite Programming, Detection and Estimation Applications ELE539A: Optimization of Communication Systems Lecture 15: Semidefinite Programming, Detection and Estimation Applications Professor M. Chiang Electrical Engineering Department, Princeton University March

More information

MASSIVE MIMO BSs, which are equipped with hundreds. Large-Scale-Fading Decoding in Cellular Massive MIMO Systems with Spatially Correlated Channels

MASSIVE MIMO BSs, which are equipped with hundreds. Large-Scale-Fading Decoding in Cellular Massive MIMO Systems with Spatially Correlated Channels 1 Large-Scale-Fading Decoding in Cellular Massive MIMO Systems with Spatially Correlated Channels Trinh Van Chien, Student Member, IEEE, Christopher Mollén, Emil Björnson, Senior Member, IEEE arxiv:1807.08071v

More information

Game Theoretic Approach to Power Control in Cellular CDMA

Game Theoretic Approach to Power Control in Cellular CDMA Game Theoretic Approach to Power Control in Cellular CDMA Sarma Gunturi Texas Instruments(India) Bangalore - 56 7, INDIA Email : gssarma@ticom Fernando Paganini Electrical Engineering Department University

More information

Performance of DS-CDMA Systems With Optimal Hard-Decision Parallel Interference Cancellation

Performance of DS-CDMA Systems With Optimal Hard-Decision Parallel Interference Cancellation 2918 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 49, NO. 11, NOVEMBER 2003 Performance of DS-CDMA Systems With Optimal Hard-Decision Parallel Interference Cancellation Remco van der Hofstad Marten J.

More information

Singular Value Decomposition

Singular Value Decomposition Chapter 6 Singular Value Decomposition In Chapter 5, we derived a number of algorithms for computing the eigenvalues and eigenvectors of matrices A R n n. Having developed this machinery, we complete our

More information

Schur-convexity of the Symbol Error Rate in Correlated MIMO Systems with Precoding and Space-time Coding

Schur-convexity of the Symbol Error Rate in Correlated MIMO Systems with Precoding and Space-time Coding Schur-convexity of the Symbol Error Rate in Correlated MIMO Systems with Precoding and Space-time Coding RadioVetenskap och Kommunikation (RVK 08) Proceedings of the twentieth Nordic Conference on Radio

More information

Performance of Reduced-Rank Linear Interference Suppression

Performance of Reduced-Rank Linear Interference Suppression 1928 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 47, NO. 5, JULY 2001 Performance of Reduced-Rank Linear Interference Suppression Michael L. Honig, Fellow, IEEE, Weimin Xiao, Member, IEEE Abstract The

More information